Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
AutoHotkey_2.0.12_setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\Templates\Minimal for v2.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\WindowSpy.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\CommandLineToArgs.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\CreateAppShortcut.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\EnableUIAccess.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\GetGitHubReleaseAssetURL.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\HashFile.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\README.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\ShellRun.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\bounce-v1.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\common.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\config.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\identify.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\identify_regex.ahk
|
ASCII text, with very long lines (3982), with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\launcher-common.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\spy.ico
|
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48
with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\inc\ui-base.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\install-ahk2exe.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\install-version.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\install.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\launcher.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\reload-v1.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\reset-assoc.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-dash.ahk
|
C source, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-editor.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-launcherconfig.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-newscript.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-setup.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\ui-uninstall.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\license.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\AutoHotkey.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\AutoHotkey32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\AutoHotkey64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\RCX9FF7.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\RCXA0E2.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\AutoHotkey64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\Install.cmd
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\Templates\Minimal for v2.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\WindowSpy.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CommandLineToArgs.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\CreateAppShortcut.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\EnableUIAccess.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\GetGitHubReleaseAssetURL.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\HashFile.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\README.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ShellRun.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\bounce-v1.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\common.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\config.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\identify_regex.ahk
|
ASCII text, with very long lines (3982), with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\launcher-common.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\spy.ico
|
MS Windows icon resource - 4 icons, 32x32 with PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 48x48
with PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\inc\ui-base.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-ahk2exe.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install-version.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\install.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\launcher.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reload-v1.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\reset-assoc.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-dash.ahk
|
C source, Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-editor.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-launcherconfig.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-newscript.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-setup.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\UX\ui-uninstall.ahk
|
C source, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\WindowSpy.ahk
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\.staging\AutoHotkey_2.0.12_setup.exe\license.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\AutoHotkey\UX\installed-files.csv
|
CSV text
|
dropped
|
||
C:\Program Files\AutoHotkey\WindowSpy.ahk
|
C source, ASCII text
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\AutoHotkey32_UIA.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\AutoHotkey\v2\AutoHotkey64_UIA.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Dash.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command
line arguments, Archive, ctime=Thu Apr 18 23:14:30 2024, mtime=Thu Apr 18 23:14:30 2024, atime=Thu Apr 18 23:14:30 2024, length=1256448,
window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoHotkey Window Spy.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command
line arguments, Icon number=0, Archive, ctime=Thu Apr 18 23:14:30 2024, mtime=Thu Apr 18 23:14:32 2024, atime=Thu Apr 18 23:14:30
2024, length=1256448, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\f213bf5a8af890680781f9b7261613ea_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
There are 69 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
|
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe"
|
||
C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe
|
"C:\Users\user\Desktop\AutoHotkey_2.0.12_setup.exe" /to "C:\Program Files\AutoHotkey"
|
||
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
|
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" "C:\Program Files\AutoHotkey\UX\reset-assoc.ahk" /check
|
||
C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe
|
"C:\Program Files\AutoHotkey\UX\AutoHotkeyUX.exe" UX\ui-dash.ahk
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://autohotkey.com/board/topic/66139-ahk-l-calculating-md5sha-checksum-from-file/
|
unknown
|
||
https://autohotkey.com(
|
unknown
|
||
https://www.autohotkey.com/download/
|
unknown
|
||
https://www.autohotkey.com/docs/v2/
|
unknown
|
||
https://www.autohotkey.com/docs/v1/
|
unknown
|
||
https://autohotkey.comD
|
unknown
|
||
http://msdn.com/library/bb756929
|
unknown
|
||
https://autohotkey.comAutoHotkey
|
unknown
|
||
https://autohotkey.com
|
unknown
|
||
https://api.github.com/repos/
|
unknown
|
||
https://autohotkey.comCould
|
unknown
|
||
https://www.autohotkey.com/docs/v2/misc/Editors.htm
|
unknown
|
There are 2 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\05DBEF8D5C39D139DDC008D18ADCE6EC816C933F
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoHotkey
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
|
InstallDir
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
|
InstallCommand
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\AutoHotkey
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\ShellNew
|
Command
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ahk\PersistentHandler
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript
|
AppUserModelID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
|
FriendlyAppName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Open
|
AppUserModelID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\RunAs
|
HasLUAShield
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\UIAccess
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Launch
|
ProgrammaticAccessOnly
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit\Command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AutoHotkeyScript\Shell\Edit
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 29 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8C6000
|
unkown
|
page execute and read and write
|
||
4D58000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
1400FB000
|
unkown
|
page readonly
|
||
13BE000
|
stack
|
page read and write
|
||
538E000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
2BE9000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
7F9000
|
stack
|
page read and write
|
||
DD2000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
33E6000
|
heap
|
page read and write
|
||
938000
|
unkown
|
page execute and write copy
|
||
4D66000
|
heap
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
148000
|
heap
|
page read and write
|
||
7B6000
|
stack
|
page read and write
|
||
4D6C000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
33EC000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4D63000
|
heap
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
EBA000
|
heap
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
F9000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
14012A000
|
unkown
|
page readonly
|
||
E50000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
EDB000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
4DFE000
|
heap
|
page read and write
|
||
34B9000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E5C000
|
heap
|
page read and write
|
||
4D6C000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
1918000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
140127000
|
unkown
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
34E4000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
4E1B000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1400DF000
|
unkown
|
page readonly
|
||
E53000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
7E5000
|
stack
|
page read and write
|
||
33E2000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
4DAA000
|
heap
|
page read and write
|
||
33E3000
|
heap
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
4D7B000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
1C3000
|
heap
|
page read and write
|
||
4E15000
|
heap
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
140121000
|
unkown
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
345C000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
140123000
|
unkown
|
page read and write
|
||
14012A000
|
unkown
|
page readonly
|
||
159000
|
heap
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
17F8000
|
heap
|
page read and write
|
||
545B000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
33E9000
|
heap
|
page read and write
|
||
4F4000
|
unkown
|
page execute and read and write
|
||
4D9E000
|
heap
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
653D000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
4E16000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
7BE000
|
stack
|
page read and write
|
||
33EF000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
92F000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
142000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
4D62000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
CE0000
|
trusted library section
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
17BF000
|
stack
|
page read and write
|
||
1C7000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
7AA000
|
unkown
|
page execute and read and write
|
||
4D58000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
6D3D000
|
stack
|
page read and write
|
||
D00000
|
trusted library section
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
7F8000
|
stack
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
ED3000
|
heap
|
page read and write
|
||
33E9000
|
heap
|
page read and write
|
||
538A000
|
heap
|
page read and write
|
||
4D5C000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
4D5C000
|
heap
|
page read and write
|
||
140123000
|
unkown
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
18E000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
92B000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
1400FB000
|
unkown
|
page readonly
|
||
E5000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
33EB000
|
heap
|
page read and write
|
||
938000
|
unkown
|
page execute and write copy
|
||
EB4000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
D35000
|
stack
|
page read and write
|
||
140121000
|
unkown
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
7ED000
|
stack
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
33E9000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
33E2000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
D29000
|
stack
|
page read and write
|
||
33E6000
|
heap
|
page read and write
|
||
3294000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
1CC000
|
heap
|
page read and write
|
||
4D83000
|
heap
|
page read and write
|
||
2A0D000
|
heap
|
page read and write
|
||
D26000
|
stack
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
4DAA000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
15B000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
E81000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
E81000
|
heap
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
693F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3134000
|
heap
|
page read and write
|
||
ED3000
|
heap
|
page read and write
|
||
1400DF000
|
unkown
|
page readonly
|
||
1B5000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
3479000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
33E4000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
4EC000
|
unkown
|
page execute and read and write
|
||
1A0000
|
heap
|
page read and write
|
||
14011F000
|
unkown
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
666000
|
unkown
|
page execute and write copy
|
||
33E5000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
D83000
|
heap
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
D47000
|
stack
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
EC8000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
4DE2000
|
heap
|
page read and write
|
||
D23000
|
stack
|
page read and write
|
||
33E3000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
1400FB000
|
unkown
|
page readonly
|
||
4E19000
|
heap
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
4D7A000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
4DF9000
|
heap
|
page read and write
|
||
93A000
|
unkown
|
page write copy
|
||
190000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
5387000
|
heap
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
100000
|
heap
|
page read and write
|
||
4F4000
|
unkown
|
page execute and read and write
|
||
33EA000
|
heap
|
page read and write
|
||
4DF7000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
EC9000
|
heap
|
page read and write
|
||
1400DF000
|
unkown
|
page readonly
|
||
4D62000
|
heap
|
page read and write
|
||
7D7000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
140120000
|
unkown
|
page write copy
|
||
4D6A000
|
heap
|
page read and write
|
||
93A000
|
unkown
|
page read and write
|
||
93A000
|
unkown
|
page write copy
|
||
4D73000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
33EF000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
14011C000
|
unkown
|
page write copy
|
||
14012A000
|
unkown
|
page readonly
|
||
4D93000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
33EA000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4E12000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4E18000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
1400FB000
|
unkown
|
page readonly
|
||
D2C000
|
stack
|
page read and write
|
||
4D83000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
14011F000
|
unkown
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
14011C000
|
unkown
|
page read and write
|
||
2A08000
|
heap
|
page read and write
|
||
14011C000
|
unkown
|
page read and write
|
||
4D73000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
4D5C000
|
heap
|
page read and write
|
||
CF0000
|
trusted library section
|
page read and write
|
||
33E4000
|
heap
|
page read and write
|
||
4D66000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
D8000
|
heap
|
page read and write
|
||
4D67000
|
heap
|
page read and write
|
||
1CD000
|
heap
|
page read and write
|
||
D4A000
|
stack
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
33EA000
|
heap
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
7AA000
|
unkown
|
page execute and read and write
|
||
140001000
|
unkown
|
page execute read
|
||
ED6000
|
heap
|
page read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
33EC000
|
heap
|
page read and write
|
||
33EE000
|
heap
|
page read and write
|
||
33E1000
|
heap
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
4D93000
|
heap
|
page read and write
|
||
4D72000
|
heap
|
page read and write
|
||
8C7000
|
heap
|
page read and write
|
||
4DE2000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
ED6000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
7D7000
|
stack
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
D26000
|
stack
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
14011D000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
4E17000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
93A000
|
unkown
|
page read and write
|
||
142000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
7D4000
|
stack
|
page read and write
|
||
33E6000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
140122000
|
unkown
|
page write copy
|
||
4D90000
|
heap
|
page read and write
|
||
4E2D000
|
heap
|
page read and write
|
||
7E5000
|
stack
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
4DF9000
|
heap
|
page read and write
|
||
341C000
|
stack
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
4D6A000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
8C6000
|
unkown
|
page execute and read and write
|
||
146000
|
heap
|
page read and write
|
||
EED000
|
heap
|
page read and write
|
||
4D5C000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
1C3000
|
heap
|
page read and write
|
||
14011D000
|
unkown
|
page write copy
|
||
E64000
|
heap
|
page read and write
|
||
140122000
|
unkown
|
page write copy
|
||
5370000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
1C8000
|
heap
|
page read and write
|
||
538E000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
4DE4000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
||
140120000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
1400DF000
|
unkown
|
page readonly
|
||
2AA0000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
4EC000
|
unkown
|
page execute and read and write
|
||
547B000
|
heap
|
page read and write
|
||
5381000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
347B000
|
heap
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
14012A000
|
unkown
|
page readonly
|
||
4DF9000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
36BC000
|
stack
|
page read and write
|
||
4CD5000
|
heap
|
page read and write
|
||
33E7000
|
heap
|
page read and write
|
||
14011C000
|
unkown
|
page write copy
|
||
161000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4E2000
|
unkown
|
page execute and read and write
|
||
DAF000
|
heap
|
page read and write
|
||
DAC000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
33E7000
|
heap
|
page read and write
|
||
4DA9000
|
heap
|
page read and write
|
||
33EC000
|
heap
|
page read and write
|
||
4DBA000
|
heap
|
page read and write
|
||
DBD000
|
stack
|
page read and write
|
||
A0000
|
heap
|
page read and write
|
||
666000
|
unkown
|
page execute and write copy
|
||
4D48000
|
heap
|
page read and write
|
||
D23000
|
stack
|
page read and write
|
||
4D7A000
|
heap
|
page read and write
|
||
613C000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
4DAD000
|
heap
|
page read and write
|
There are 443 hidden memdumps, click here to show them.